Vol.35, No.1, 2023, pp.839-851, doi:10.32604/iasc.2023.028548
Data Mining with Privacy Protection Using Precise Elliptical Curve Cryptography
  • B. Murugeshwari1,*, D. Selvaraj2, K. Sudharson3, S. Radhika4
1 Department of Computer Science and Engineering, Velammal Engineering College, Chennai, 600066, India
2 Department of Electronics and Communication Engineering, Panimalar Engineering College, Chennai, 600123, India
3 Department of Information Technology, Velammal Insitutue of Technology, Chennai, 601204, India
4 Department of Computer Science and Engineering, Saveetha School of Engineering, Saveetha Institute of Medical and Technical Sciences, Chennai, 600124, India
* Corresponding Author: B. Murugeshwari. Email:
Received 12 February 2022; Accepted 18 March 2022; Issue published 06 June 2022
Protecting the privacy of data in the multi-cloud is a crucial task. Data mining is a technique that protects the privacy of individual data while mining those data. The most significant task entails obtaining data from numerous remote databases. Mining algorithms can obtain sensitive information once the data is in the data warehouse. Many traditional algorithms/techniques promise to provide safe data transfer, storing, and retrieving over the cloud platform. These strategies are primarily concerned with protecting the privacy of user data. This study aims to present data mining with privacy protection (DMPP) using precise elliptic curve cryptography (PECC), which builds upon that algebraic elliptic curve in finite fields. This approach enables safe data exchange by utilizing a reliable data consolidation approach entirely reliant on rewritable data concealing techniques. Also, it outperforms data mining in terms of solid privacy procedures while maintaining the quality of the data. Average approximation error, computational cost, anonymizing time, and data loss are considered performance measures. The suggested approach is practical and applicable in real-world situations according to the experimental findings.
Data mining; cryptography; privacy preserving; elliptic curve; information security
Cite This Article
B. Murugeshwari, D. Selvaraj, K. Sudharson and S. Radhika, "Data mining with privacy protection using precise elliptical curve cryptography," Intelligent Automation & Soft Computing, vol. 35, no.1, pp. 839–851, 2023.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.